Cyber Security

Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cybersecurity.

hg

root9B

root9B is a provider of cybersecurity and advance technology training capabilities, operational support and consulting services. The company is dedicated to the delivery of solutions and services based on technical innovation and professional excellence. root9B’s workforce consists of U.S. military and law enforcement veterans with extensive experience in providing advanced technology solutions.

Sector: Cybersecurity Consulting and Operational Support
Corporate HQ: Colorado Springs, Colo.

hfjkh

Herjavec Group

Dynamic IT entrepreneur Robert Herjavec, founded Herjavec Group in 2003, which quickly became one of North America’s fastest-growing technology companies, accelerating from $400K to $140 million in sales annually over 12 years. The company delivers managed security services globally supported by a state-of-the-art, PCI compliant Security Operations Centre (SOC), operated 24/7/365 by certified security professionals. This expertise is coupled with a leadership position across a wide range of functions including compliance, risk management, networking and incident response.

Sector: Information Security Service
Corporate HQ: Toronto, Canada

dh

IBM Security

As a global leader in IT security, IBM offers the strategies, capabilities, and technologies necessary to help agencies preemptively protect Web applications from threats and address the complexities and growing costs of security risk management and compliance.

Sector: Enterprise IT Security Solutions
Corporate HQ: Waltham, Mass.

grf.jpg

Check Point Software

Since 1993, Check Point has been dedicated to providing customers with uncompromised protection against all types of threats, reducing security complexity and lowering total cost of ownership. The company’s mission is to stay focused on customer needs and develop solutions that redefine the security landscape.

Sector: Unified Threat Management
Corporate HQ: Tel Aviv, Israel

fhdfh.jpg

Palo Alto Networks

Palo Alto Networks‘ security platform natively brings together all key network security functions, including advanced threat protection, firewall, IDS/IPS, and URL filtering. Because these functions are natively built into the platform and share important information across the respective disciplines, it ensures better security than legacy firewalls, UTMs, or point threat detection products.

Sector: Threat Detection and Prevention
Corporate HQ: Santa Clara, Calif.

hg

Cisco

Cisco security innovations provide highly secure firewall, Web and email services, while helping to enable mobility and teleworking. Cisco security products include access control and policy, advanced malware protection, email security, firewalls, network security, NGIPS, security management, VPN and Web security.

Sector: Threat Protection and Network Security
Corporate HQ: San Jose, Calif.

hfd.jpg

Fortinet

Fortinet protects networks, users and data from continually evolving threats. As a global leader in high-performance network security, the company enables businesses to consolidate and integrate stand-alone technologies without suffering performance penalties. Fortinet solutions empower customers to embrace new technologies and opportunities while protecting essential systems and content.

Sector: Enterprise Security Solutions
Corporate HQ: Sunnyvale, Calif.

]dfh.jpg

BAE Systems

BAE Systems consulting services help clients prepare for cyber attacks by understanding and managing cyber exposure, enabling them to make informed investment decisions and to put pragmatic, cost-effective protection in place.

Sector: Cybersecurity Risk Management
Corporate HQ: Surrey, U.K.

dhg.jpg

FireEye

FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks.

Sector: Advanced Threat Protection
Corporate HQ: Milpitas, Calif.

ftjh

Sera-Brynn

Sera-Brynn is a cybersecurity firm and PCI QSA dedicated to helping clients secure their computing environments and meet applicable mandatory industry and government compliance requirements.

Sector: Cyber Risk Management
Corporate HQ: Suffolk, Va.

aa.jpg

Clearwater Compliance

Clearwater Compliance helps health care organizations ensure patient safety and improve the quality of care by safeguarding the confidentiality, integrity and availability of protected health information (PHI). The company has assisted more than 400 customers to operationalize and mature their information privacy, security, compliance and information risk management programs.

Sector: Risk Management and Compliance
Corporate HQ: Nashville, Tenn.

aaaa.jpg

Gigamon

Gigamon provides an intelligent Visibility Fabric™ architecture for enterprises, data centers and service providers around the globe. Gigamon technology empowers infrastructure architects, managers with pervasive and dynamic intelligent visibility of traffic across both physical and virtual environments without affecting the performance or stability of the production network.

Sector: Data Center and Cloud Security
Corporate HQ: Milpitas, Calif.

aaaa.jpg

RSA

RSA, the security division of EMC, is a provider of intelligence-driven security solutions. RSA helps organizations solve their security challenges: managing organizational risk, safeguarding mobile access and collaboration, preventing online fraud, and defending against advanced threats.

Sector: Intelligence Driven Security
Corporate HQ: Bedford, Mass.

as.jpg

Symantec

Founded in 1982, Symantec has evolved to become a global leader in cybersecurity, with more than 11,000 employees in more than 35 countries. Operating one of the world’s largest cyber intelligence networks, Symantec sees more threats and protects millions of customers from the next generation of attacks.

Sector: Endpoint, Cloud and Mobile Security
Corporate HQ: Mountain View, Calif.

aaf.jpg

Mimecast

Mimecast delivers cloud-based email management for Microsoft Exchange, including archiving, continuity and security. By unifying disparate and fragmented email environments into one holistic solution that is always available from the cloud, Mimecast minimizes risk and reduces cost and complexity, while providing total end-to-end control of email.

Sector: Email Security
Corporate HQ:
Watertown, Mass.

asss.jpg

Sophos

Sophos began producing antivirus and encryption products nearly 30 years ago. Today, the company’s products help secure the networks used by 100 million people in 150 countries and 100,000 businesses. As IT networks grow in complexity, Sophos focuses on keeping IT security simple and reliable.

Sector: Antivirus and Malware Protection
Corporate HQ: Abingdon, UK

aaac.jpg

Rapid7

Rapid7‘s IT security solutions deliver visibility and insight that help organizations make informed decisions, create action plans, monitor progress and simplify compliance and risk management. Over 2,500 enterprises use Rapid7’s simple, innovative solutions. Its free products are downloaded over one million times per year and are enhanced by more than 200,000 open source security community members.

Sector: Security Data and Analytics Solutions
Corporate HQ: Boston, Mass.

ads.jpg

Thycotic

Thycotic is a global leader in next-generation IT security solutions that protect organizations again cyber attacks that use privileged accounts to strike at the core of the enterprise.

Thycotic, a global leader in next-generation enterprise password management, delivers an indispensable, comprehensive privileged-account-management solution to protect your “keys to the kingdom” from cyber attacks and insider threats.

Sector: Privileged Account Management
Corporate HQ: Washington, D.C.

aws.jpg

IKANOW

In the 2000s, the concept for IKANOW was formed around the following questions:

  • Why is it so hard to put data into my analytical tools?
  • Why do SIEM tools break down with large volumes of data?
  • Why are SIEM tools and analytical tools so expensive relative to value?
  • Why are most cyber and risk analytics platforms proprietary and closed?
  • Why is there not an open network of analytical professionals all working together?

While IKANOW was crafted around these core questions, the company has since grown and has created additional cyber-threat intelligence, risk management, and SIEM tools, but the focus has not changed.

Sector: Information Security Analytics
Corporate HQ: Reston, Va.

Source:http://www.itbusinessedge.com/slideshows/top-25-cybersecurity-companies-to-watch-in-2015-21.html

Cybercriminal

Definition – What does Cybercriminal mean?

A cybercriminal is an individual who commits cybercrimes, where he/she makes use of the computer either as a tool or as a target or as both.

Cybercriminals use computers in three broad ways:

  • Select computer as their target: These criminals attack other people’s computers to perform malicious activities, such as spreading viruses, data theft, identity theft, etc.
  • Uses computer as their weapon: They use the computer to carry out “conventional crime”, such as spam, fraud, illegal gambling, etc.
  • Uses computer as their accessory: They use the computer to save stolen or illegal data.

[WEBINAR] Data & Security: Audits, Monitoring, and Alerts

Techopedia explains Cybercriminal

Cybercriminals often work in organized groups. Some cybercriminal roles are:

  • Programmers: Write code or programs used by cybercriminal organization
  • Distributors: Distribute and sell stolen data and goods from associated cybercriminals
  • IT experts: Maintain a cybercriminal organization’s IT infrastructure, such as servers, encryption technologies and databases
  • Hackers: Exploit systems, applications and network vulnerabilities
  • Fraudsters: Create and deploy schemes like spam and phishing
  • System hosts and providers: Host sites and servers that possess illegal contents
  • Cashiers: Provide account names to cybercriminals and control drop accounts
  • Money mules: Manage bank account wire transfers
  • Tellers: Transfer and launder illegal money via digital and foreign exchange methods
  • Leaders: Often connected to big bosses of large criminal organizations. Assemble and direct cybercriminal teams, and usually lack technical knowledge.

Clearly, there is much overlap between roles, but as cybercrime becomes a greater issue, more specialization is being seen as organized crime gets in the picture. For example, hackers were once more often than not hobbyists who broke into systems for personal gratification. While white-hat hacking hasn’t disappeared, it’s much more common now to see hackers as professionals who sell their services to the highest bidder.

Source:https://www.techopedia.com/definition/27435/cybercriminal

Posted By: Cristina O. Libuna

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s